Several years ago a ring of foreign-based hackers broke into Town Bank’s system and stole $10 million from its customers’ accounts. Discuss how systems can become vulnerable to computer crimes and then evaluate controls that strengthen those weaknesses. Required: a) Provide at least three weaknesses of AIS that hackers can exploit for gain and then b) Suggest at least one control for each weakness Solution Systems become vulnerable to computer crimes due to lack of security and access of the computers by multiple users, Absence of segregation of duties. Controls are:- Detective Controls:- i.e. passwords to access the computer, Antiviruses, Firewall , Employ Qualified Personnels. Some other controls are keeping guard at the entrance places and limited access of the computers only by the authorized personnels. .